Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]

Gert Doering <gert@space.net> Thu, 06 December 2018 09:32 UTC

Return-Path: <gert@space.net>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3C10130EB3 for <tsv-art@ietfa.amsl.com>; Thu, 6 Dec 2018 01:32:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y73ym3fznILL for <tsv-art@ietfa.amsl.com>; Thu, 6 Dec 2018 01:32:02 -0800 (PST)
Received: from mobil.space.net (mobil.space.net [195.30.115.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF313131124 for <tsv-art@ietf.org>; Thu, 6 Dec 2018 01:31:56 -0800 (PST)
X-Original-To: tsv-art@ietf.org
Received: from mobil.space.net (localhost [IPv6:::1]) by mobil.space.net (Postfix) with ESMTP id 2042741C21 for <tsv-art@ietf.org>; Thu, 6 Dec 2018 10:31:55 +0100 (CET)
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
X-SpaceNet-Relay: true
Received: from moebius4.space.net (moebius4.space.net [IPv6:2001:608:2:2::251]) by mobil.space.net (Postfix) with ESMTP id 0ED5F40B9E; Thu, 6 Dec 2018 10:31:55 +0100 (CET)
Received: by moebius4.space.net (Postfix, from userid 1007) id 0A8AAF20C; Thu, 6 Dec 2018 10:31:55 +0100 (CET)
Date: Thu, 06 Dec 2018 10:31:54 +0100
From: Gert Doering <gert@space.net>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Gert Doering <gert@space.net>, Christopher Morrow <morrowc.lists@gmail.com>, heard@pobox.com, tsv-art@ietf.org, opsec wg mailing list <opsec@ietf.org>, ietf <ietf@ietf.org>, draft-ietf-opsec-ipv6-eh-filtering.all@ietf.org
Message-ID: <20181206093154.GF1543@Space.Net>
References: <CACL_3VGeJPzDhS0RVAvpQs9W8b4EODft-qJRwBD6Xxm+X6BZ6A@mail.gmail.com> <CAL9jLabK0bZz2nki=oFNHT0OrpVAB8pw7emAj2BtkHRCzkfmqQ@mail.gmail.com> <cf64abbf-e447-71e3-b983-4e525cc139aa@gmail.com> <CAL9jLaYMRDGFa7Qzj4ukRV1FPbJM40qbuZ34SYxoA30Z+h3EWw@mail.gmail.com> <20181205085227.GG1543@Space.Net> <9ba948f9-f286-1016-2dbd-f7056a15e744@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="bpNGSkw8ExqLHKDe"
Content-Disposition: inline
In-Reply-To: <9ba948f9-f286-1016-2dbd-f7056a15e744@gmail.com>
X-NCC-RegID: de.space
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/iWYyvB476h5xjgKQJj0IZXgEWNc>
Subject: Re: [Tsv-art] game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 09:32:05 -0000

Hi,

On Thu, Dec 06, 2018 at 01:14:54PM +1300, Brian E Carpenter wrote:
> > Which implies that as soon as the evil guys out there find a way to
> > generate DDoS streams carrying EHs that our border routers will (have to)
> > apply very strict rate limiting to everything they do not understand.
> > 
> >  - pass TCP
> >  - rate-limit UDP on well-known reflective attacks port
> >  - pass rest of UDP
> >  - rate-limit ICMP
> >  - rate-limit fragments
> >  - rate-limit all the rest to something which can never exceed a customer's
> >    access-link
> > 
> > game over, EH
> 
> Just to point out that this is equivalent to saying "game over,
> any new layer 4 protocol" too. For example, you just killed SCTP.
> And the same goes for new protocols over IPv4.

Well.  Since nobody is using SCTP, it can nicely live in the 
"rate-limit all the rest to something ..." bucket...

But yes, "any new layer 4 protocol" is likely to not work in an Internet
that is basically full of hostile packets *in high volumes*.

Trying to run large volume traffic over UDP/443 is going to be the next
excercise in "operators told you that is isn't going to work"...

Gert Doering
        -- NetMaster
-- 
have you enabled IPv6 on something today...?

SpaceNet AG                      Vorstand: Sebastian v. Bomhard, Michael Emmer
Joseph-Dollinger-Bogen 14        Aufsichtsratsvors.: A. Grundner-Culemann
D-80807 Muenchen                 HRB: 136055 (AG Muenchen)
Tel: +49 (0)89/32356-444         USt-IdNr.: DE813185279